Ficaremos felizes em atendê-lo!
    
        Contato
 
                                    
    
    
                             
            
         
     
    
    
        
    
            
            
        
            
     
        
            
            
            
    
    
    
        
    
    
                
        
    
    
    
    
        
            
            
            
        
                    
        
    
             
    
                
            Data Protection and Management (DPM) – Outline
            
            
    
            
            
                
                                    
                                                
                            Outline detalhado do curso
                        
                        Introduction to Data Protection
- Data Protection Primer
 - Data Center
 - Data Protection and Availability Solutions
 
Data Protection Architecture
- Data Source – Application and Hypervisor
 - Data Source – Primary Storage
 - Protection Application and Storage
 - Data Security and Management
 
Fault-Tolerance Techniques
- Fault-Tolerance Overview
 - Fault Tolerance Techniques – Compute and Network
 - Fault Tolerance Techniques – Storage
 - Fault Tolerance Techniques – Application and Availability Zone
 
Data Backup
- Introduction to Backup
 - Backup Topologies
 - Backup Methods
 
Data Deduplication
- Data Deduplication Overview
 - Deduplication Granularity and Methods
 
Replication
- Data Replication Overview
 - Local Replication
 - Remote Replication
 
Data Archiving
- Data Archiving Overview
 - Archiving Operation and Storage
 
Data Migration
- SAN-Based Data Migration
 - NAS-Based Data Migration
 - Host-Based Data Migration
 - Application-Based Data Migration
 
Data Protection in Software-Defined Data Center
- Software-Defined Data Center Overview
 - Software-Defined Compute, Storage, and Networking
 - Data Protection Process in SDDC
 
Cloud-based Data Protection
- Cloud Computing Overview
 - Cloud-Based Data Protection
 - Cloud-Based Data Archiving
 
Protecting Big Data and Mobile Device Data
- Big Data Overview
 - Protecting Big Data
 - Protecting Mobile Device
 
Securing Data Protection Environment
- Overview of Data Security
 - Security Threats in Data Protection Environment
 - Security Controls in Data Protection Environment – 1
 - Security Controls in Data Protection Environment – 2
 - Cyber Recovery
 
Managing the Data Protection Environment
- Introduction to Data Protection Management
 - Operations Management – 1
 - Operations Management – 2